We are seeking a skilled and experienced SOC Analyst Level 3 to join our Cybersecurity Operations Center.
This is a senior-level role that requires hands-on expertise in threat detection, incident response, threat hunting, and advanced log analysis.
The ideal candidate will serve as a technical lead in investigating complex security incidents, mentoring junior analysts, and proactively improving the organization's security posture.
Key Responsibilities:
- Act as a lead incident responder for critical cybersecurity threats and advanced persistent threats (APTs).
- Monitor and analyze security events using SIEM (e.g., Splunk, QRadar, LogRhythm) and EDR tools (e.g., CrowdStrike, SentinelOne).
- Perform in-depth investigation of alerts to determine the severity, scope, and impact of potential security incidents.
- Conduct root cause analysis and forensic reviews using tools like EnCase, FTK, or open-source equivalents.
- Lead threat hunting activities using threat intelligence feeds, behavioral analytics, and advanced data correlation.
- Develop and fine-tune correlation rules, use cases, dashboards, and alerting logic in SIEM platforms.
- Collaborate with other cybersecurity and IT teams to coordinate incident containment, eradication, and recovery.
- Assist in the development and continuous improvement of playbooks, response procedures, and knowledge bases.
- Mentor and guide L1 / L2 SOC analysts, providing training and review of escalated incidents.
- Stay updated on the latest cybersecurity threats, vulnerabilities, and regulatory requirements (e.g., ISO 27001, GDPR).
Skills & Experience:
- Minimum 5 years of experience in cybersecurity with at least 2 years in a Level 3 SOC Analyst role.
- Strong hands-on experience with SIEM tools (e.g., Splunk, QRadar, ArcSight).
- Proficient in incident response, malware analysis, threat intelligence, and network traffic analysis.
- Experience with EDR / XDR platforms, firewalls, IDS / IPS, DLP, and forensic tools.
- Good understanding of MITRE ATT&CK, cyber kill chain, TTPs, and common threat actors.
- Scripting skills (Python, PowerShell, Bash) are an advantage.
- Knowledge of cloud security (AWS, Azure, GCP) and securing hybrid environments.
Certifications:
- CEH, CHFI, GCIH, GCIA, GCFA, OSCP, or other relevant cybersecurity certifications.